Out of the desire to become hackers, many users become victims of hackers - video tutorial

In this video tutorial you will see an interesting but extremely dangerous software created to get into the computers of others, who unfortunately uses becomes the victim himself or those who have developed the software for control, rather soft espionage.

Surprisingly, this software costs money, the world is interested because he knows when man was sick curiosity to be aware of what is neighbor with what's deal where money is plasma?

How do you get to the point of being a victim instead of a spy? Many young computer users see on the PC "craftsmen" of the PC breaking into databases and stealing confidential data, they are presented on TV as heroes who do great things that an ordinary mortal could not even think for.

Young people who see these heroic deeds of "hackers", in turn, want to become hackers and break who knows what server from NASA, CIA, FBI, etc. All these young people are starting to google and search for "hacker programs" or "hack programs", fortunately such programs do not exist on google, instead they find sites for recruiting childish naivety such as the one presented in the tutorial , who very kindly make available to any aspirant to the function of "messenger password breaker" a hack software, more precisely a software for controlling a remote computer, of course for a small sum, "to be there for a cico ”.

I think that the price paid for this software removes any doubt about the seller's creditworthiness, the saying "if he was to fool me, he wouldn't ask me for money for the software".

I stop here with the story, let you follow this tutorial and please plug the senses, I admire those who worshiped hackers and the damage they do.

We will talk on another occasion about hackers, how they were before and how they are now, nowadays everything is distorted, the hacker no longer leads any anti-corporate fight, he is concerned today with other things, about these we will speak on another occasion, now I leave you to watch this video tutorial.

Happy browsing and open your eyes!

Constantin Necula (Corleone)

 


Related Tutorials


About Cristian Cismaru

I like everything related to IT&C, I like to share the experience and information I accumulate every day.
Learn as you learn!

Comments

  1. tutorialu's nice bn that shows you can get hurt if others to walk loaded with crap

  2. Nice tutorial, good Corleone!

  3. Alambymy said

    beak:
    bn tutorialu's nice that shows that others may get hurt if loaded to walk with stupid

    Congratulations, very interesting, Mr. CIOC's right!

  4. unfortunately I "tested" it and I found a keygen on it on the net and I installed it a long time ago .. (2 years)! immediately after that I lost the password on Steam .. I gave a lot of money on steam games… I was also found the password to mess .. in short this program besides giving you the opportunity to enter others on the pc .. it robs you you too .. ! I later found out that it is a program that actually does you your own harm .. but I did not know all the things about it as presented in this tutorial ..! thanks for the tutorial it is very interesting!

    Note .. This videotutorial is made to look a how the program works ..!

    DO NOT INSTALL THIS PROGRAM! YOU WILL LOSE ALL LICENSED GAMES AND EVERYTHING YOU VALUE IN THE COMPUTER (passwords, accounts, licenses, important data ect ect!) Hello!

  5. dan scarlat said

    Hi all
    bravo you rock
    for some time I found this site on the net
    is super
    scare you can do some programs

  6. Preda Viorel said

    Gentlemen are ff tari.eu one waiting for me if I understood what it used ceva.mi thanks.
    question. Same thing happens with TeamViewer program?

  7. Preda Viorel: Gentlemen are ff tari.eu one waiting for me if I understood what it used ceva.mi thanks.
    question. Same thing happens with TeamViewer program?

    K we see tutorial about TeamViewer, you writing at top right Search TeamViewer you enter and watch the tutorial, and you'll see for yourself the difference ... with TeamViewer you can not come without the other

  8. How to change your login password when you want to get into another computer

  9. Preda Viorel said

    Adrian: K we see tutorial about TeamViewer, you writing at top right Search TeamViewer you enter and watch the tutorial, and you'll see for yourself the difference ... with TeamViewer you can not come without the other

    Sorry for the question, I knew I could see the tutorials presented demult.scuze again. Regards to all.

  10. Bogdan 85 said

    Dude you hardly look ala proxy luck and all the best, you can do as soon tutorialaul one with proxy, please more!

  11. corelone what prog did you use for ProxySwitcher ip and from there you choose which program or proxy?

  12. swwwwwwwwwwwwwwwwwpeeeeeeeerrrrr ......
    I haven't seen an asha d hard tutorial in a long time…
    Corlene congratulations, congratulations!
    e bn that you showed the world that you can dak "ìi manank" to go to others in comp…

    Corleone, could you tell me about the price of that program?
    ms advance!

  13. Corleone said

    Bogdan 85: Dude you hardly look ala proxy luck and all the best, you can do as soon tutorialaul one with proxy, please more!

    It's time everyone needs to know it's not so easy to present an application to film it to control what comes out of your mouth so that in the end the world can learn from what you showed. That's why once and for all I bbai putzin but that's not important. You Bogdan, I see that you and lazy to vote have patience….

    Bogdan 85: Dude you hardly look ala proxy luck and all the best, you can do as soon tutorialaul one with proxy, please more!

  14. Corleone said

    haosss You're brave I realize, what do you say clean everything and ready, well I only presented what I knew but, do you know what else he can do? But because I think you're his river age, which and he is curious that a cat will answer you… .even though I said in the tutorial..you don't have to borrow from the bank to have it and not even from friends, its price is () + the fact that you become guinea pigs + wasted time + that once you use it and you will be discovered, you will be able to put in a few years (years in which I say you will definitely forget how to use a computer). Is the meeting worth it?

  15. agree to another does not count, you education, but you should know to protect yourself, not all the 7 years, and the temptation is so great, if only out of curiosity and sense of feeling powerful. Anyway, I learned useful things. a topic that interests me, thank you very much

  16. version 3.2 has appeared and it's much more tricky: D: D: D… .you can do many more things and much easier… ..and for those who comment here… I advise you not to speak ill of the creator of this program … That's why you want to stay calm at the computer :))))

  17. I really patito Corleone once but I realized they were in danger and acted nice tutorial and expect things like that

  18. Corleone Bravo! Good tutorialu1
    Forget about sites like hell… nustiu how, and this remote control programs or broken passwords or blah blah..It's not worth it!

  19. Pala: 3.2 version appeared and is more slick: D: D: D .... you can do much more and much easier ..... and for those who comment on here ... I advise you not dissing the creator of the schedule ... this horse dak want to sit quietly Shammai :))))

    And who are you ??? "Sent" to "author" ??? or are you his arrow ?? =)) look, you call me the "head of all fools" who made fun of that jaxorel, that I spoke ill of him and that he was a nice and polite org to break my mess password and my pc =) ) give the first days to shoot a bullet in the dowel!

  20. Honestly tutorial poor way to know that the guinea pig Hellsoft reach anyone and no one is forced to download / buy those software, software is downloaded at your own risk (point)

    Xardas sold out for this software because it is created and it seems normal to get some coins in his work.

    You probably have not been restricted access on the category Regulations

    goodbye

  21. Good tutoriual, Corleone!
    I hope that after watching it, many terrible people with the skills of computer geniuses will put their minds in their heads and think twice before initiating any espionage action against a poor man with a less "armored" system. .
    I noticed him using antivirus Avast.O be good, but I failed at a simple test test.Este, among many others, which can check a product akin securitate.Iata that is:
    -Open a text editor (eg notepad.)
    -pastati urmatorulcod: X5O!P%@AP[4\PZX54(P^)7CC)7}$EICAR-STANDARD-ANTIVIRUS-TEST-FILE!$H+H*
    -Save the file with a certain name, save it, then rename it.
    A good antivirus file immediately identify as one infectat.Avast tested on a virtual machine, sleeping in slippers when I renamed the file and did not give any sign of life even when I open the file. Only an express scan catidicsit was ringing and telling me that the file is virusat.In exchange Comodo birds that burned first.
    Conclusion: a bit of attention and the antivirus that you choose.
    Otherwise, all the best. Sincerely, Romeo.

  22. ms

  23. Romeo: Good tutoriual, Corleone!
    I hope after watching his multi teribilisti the foodie geniuses in Computer Science, will put your mind in your head and will think twice before initiating any action against any fucking spy system less, armored " . using antivirus Avast.O I noticed he be good, but I failed a simple test test.Este, among many others, which can check a product akin securitate.Iata which is this:-Open a text editor (eg notepad.)-Pastor urmatorulcod: X5O! P% @ AP [4 \ PZX54 (P ^) 7CC) 7} $ EICAR-STANDARD-ANTIVIRUS-TEST-FILE! $ H + H *-save file with a certain name, save it, then rename it.
    A good antivirus file immediately identify as one infectat.Avast tested on a virtual machine, sleeping in slippers when I renamed the file and did not give any sign of life even when I open the file. Only an express scan catidicsit was ringing and telling me that the file is virusat.In exchange Comodo birds that burned prima.Concluzia: a bit of attention and the antivirus that you choose. Otherwise, all the best. Sincerely, Romeo.

    Do not know where you took that code but it's wrong, and after you have pasta in a text file to be saved that file nume.exe gotta give him extension. Exe and when you give a save to see that no it does not let you save even! Here's an alert from Avast PRINT http://i30.tinypic.com/ngcxvs.jpg when I wanted to save it and jump on it (the code is this: X5O! P% @ AP [4 \ PZX54 (P ^) 7CC) 7} $ EICAR-STANDARD-ANTIVIRUS-TEST-FILE! $ H + H *) and this tets is taken by all antiviruses and the weakest antivirus will take this test, it is in the signature database of all viruses under the name "Eicar Test no Virus" so… I don't know where you copied that code from or how you proceeded yes to me the avast contradicts you !!!

  24. Excuse me, but your stupidity is very great! … I will also do tutorials on how to install messu and with team wieru how to walk..well grow up and grandma knows how to walk with tea m wier (to use it), anything stupid and retart…

  25. 🙂 ms important :)))

  26. dumitru32 said

    Good tutorial, congratulations for starting to learn the world in this field as well…
    I also have a question, is this svchost.exe necessarily a virus, or can it be a process in the system? In my task manager it shows me that there are two svchost.exe… 😉

  27. F. interesting. Thank you

  28. Crisis: Excuse me but you stupidity is really great! I make tutorials ... and how to install and messu and wieru team as well CREC walk .. and knows how to walk with tea bunicamea m Wier (to use), any dumb retart ...

    These tutorials are addressed to all categories of users, everyone can find here what he needs, normally an experienced user like your grandmother will not follow the tutorial with teamviewer, to know that there are people in this country who have just bought a PC and I don't know where to start, for them we also have a tutorial with "copy-paste".
    If we make tutorials or grid computing load balancing do not think anyone would be interested in them.
    Please let arrogance that I was away, always a very experienced PC user dem will be more modest than you or your grandmother.
    We do not record or tutorial to give us a show, we realize tutorials designed to help users, regardless of their training.
    Browse this site and you will find advanced tutorial for your grandmother, I'm sure they will be very delighted, for it surely will make us new 3D a tapestry of course before we will design in CAD.

  29. Crisis: Excuse me but you stupidity is really great! I make tutorials ... and how to install and messu and wieru team as well CREC walk .. and knows how to walk with tea bunicamea m Wier (to use), any dumb retart ...

    And if you are so good at IT, why are you still watching these tutorials ??? By the way, they weren't made for you, but for those who don't know and can't handle PCs, if you're so good don't look uncle, it's simple !!! We are waiting for you with comments at least as "interesting"!

  30. dumitru32: Good tutorial, good that you have started to learn the world in this field ...
    I have a question that is not necessarily svchost.exe virus, or it may be a process in the system? In my task manager shows me that there are two svchost.exe ...

    It is a process of Windows legitimate but do not follow the tutorial and see it in the folder you should not!

  31. dumitru32 said

    Adrian:
    It is a process of Windows legitimate but do not follow the tutorial and see it in the folder you should not!

    No, I do not have that folder ...

  32. dumitru32:
    No, I do not have that folder ...

    Then everything is ok and you should not worry! USE firewall is good for you!

  33. I would really like a video tutorial with and about "proxy"….

  34. dumitru32 said

    Adrian:
    Then everything is ok and you should not worry! USE firewall is good for you!

    Yes, I had problems with a virus about 2 days ago. I kept getting Avira on a dll, and I hadn't backed it up, I thought I'd have to reinstall Windows again. But, I managed to delete it, and I changed the firewall, until now I was using Zone Alarm, now I put Comodo, I think it's better

  35. Lucian: I really want a vdeotutorial with and about "proxy" .... otherwise hard tuto '

    Know that we have a tutorial on navigating through proxy, if you look in the category Internet / Browsers / navigation-Anonima'll find him.
    Have drop-down menus that you can find very quickly or you can use any search engine, it will find any if on this site, we have around 200 tutorials on different subjects and it is impossible not to find something to your taste, as evidence we have anonymous browsing proxy tutorial there find tips on how to surf anonymously on the net without getting one track, still there you will learn how to change your IP.
    Enjoy.

  36. rootalkin said

    Good tutorial. I wonder who really take seriously what was said.
    I tried different things "hacking". The truth is you do not. All those who do victims end up being victims themselves.
    There was a time when searching on Google or on various forums, websites to break some passwords.
    But I figured that are Donkey time. I do not mean by this that it is impossible to break a password. But just like real hackers are smart enough to write their own programs and do not give the net.
    So let a soft boys. If you are not able to be tortured real hacker then do not go.

  37. rootalkin said

    rootalkin: Good tutorial. I wonder who really take seriously what was said.
    I tried different things "hacking". The truth is you do not. All those who do victims end up being victims themselves.
    There was a time when cautampe google or forums on different sites to break some passwords.
    But I figured that are Donkey time. I do not mean by this that it is impossible to break a password. But just like real hackers are smart enough to write their own programs and do not give the net.
    So let a soft boys. If you are not able to be tortured real hacker then do not go.

  38. Poor tutorial Mr. Corleone, besides that it is kinda stupid comment (perhaps you molvodean: D) is observed and poorly informed you are about this application.
    1. The application is no longer offered for sale for more than 10 months it was not illegal because it was created by someone and has every right to publish it as believed.
    2. HellSoft.ro site is NOT a virus and not get one as guinea pigs, each is free to download and use files from there onto your account, no one is obligated to buy something.
    3. Version you just presented is one BIND server with CLD your data does not get the email not know what the creator, even when you do not get connected anywhere you permission because data ... make a connection between you and the victim's PC ! Uninstall software and does not include a server version is sold directly from the author was NOT BIND.
    Next Time May documenting yourself then you can create tutorials

  39. Hello ! Good tutorial, but I want to ask you something similar to the "Remote Control" tutorial, but I want to ask Corleone if he can help me see if I'm someone's guinea pig. Because I'm using this Hell-Kill v3.0 software. XNUMX ”and I leave a link here For Corleone and say to me if I am at risk for using this software. Pretty please Corleone If you can help me??

  40. marius512 said

    Crisis: Excuse me but you stupidity is really great! I make tutorials ... and how to install and messu and wieru team as well CREC walk .. and knows how to walk with tea bunicamea m Wier (to use), any dumb retart ...

    That reminds me of a "Nettle" joke.
    Mitica at an office where the audition is multilingual:
    -English?
    -No.
    -French?
    -No.
    -German?
    -No.
    -Okay, but then what languages ​​do you know?
    _Nici One, I came to tell you just do not count on me.
    So expect to post and tu.Noi people who do not understand, but you just posted to let us know you're smart.

  41. Corleone: Haosss're brave bag I know, how about you all clean and ready, well I presented I just knew it but you know it you can still do it? But because I think you're his age fiumiu that and it is curious that a cat will answer you .... although I ziso and tutorial .. you must not have pt.al bank loan or even friends, his price is () + that become + Injury + mice that once you use it and you could be found jumping and some chicken batting years (years in which certain tio say you definitely look like one uses a computer). assembly Fa ... worth it?

    NO CORLEONE… you didn't understand… I was simply interested as an idea… I would have wanted to roast, because I have a friend who is good at such a project and I know that he also made a CV like [so I would would have wanted to see if he can help me change sal to see if he can get out of it anything that could identify you or send data…] plus as nush sure if I'm more adventurous in taking data from someone but I just want to use the phase with the closing of the comp !!! ...
    BFT

  42. Hi guys. frankly I'm amazed finish watching this tutorial and I was the mask. One question I have I use Avira which has firewall. Honestly I'm not a computer genius of the Avira firewall is good?
    So I had to ask. Otherwise keep up the good work guys I'm sure many people f tutorialel help you. Thousand one I have been most helpful. Bafta

  43. hello, the remote control program helped me a lot, in the sense that you give the server which (depends on the antivirus) is not detected… and you have full access to the person's computer, you put a keylogger and you get everything that is typed. Remote control 3.0 is free… not for sale, version 3.1 is for sale… you wrote the wrong password because u were trying to connect to your ip itself… you had to do this test on 2pcs with different ip + that if you have a router you are not vulnerable to this program… and many other programs of this kind. Good luck!

  44. NoName: Weak tutorial Mr. Corleone, in addition to being pretty stupid comment (perhaps you molvodean) and observe that you are poorly informed about this application.
    1. The application is no longer offered for sale for more than 10 months it was not illegal because it was created by someone and has every right to publish it as believed.
    2. HellSoft.ro site is NOT a virus and not get one as guinea pigs, each is free to download and use files from there onto your account, no one is obligated to buy something.
    3. Version you just presented is one BIND server with CLD your data does not get the email not know what the creator, even when you do not get connected anywhere you permission because data ... make a connection between you and the victim's PC ! Uninstall software and does not include a server version is sold directly from the author was NOT BIND.
    Next Time May documenting then you can create tutorials

    And just think if it was Bindi k whatever you k author was stupid to confirm how you get the data on to him? =)) And sit and think about it ... if you go to someone in PC you go and say you want to do, what you do or what you did? =))) Bottom line? ARE NAIVE!! Very naive ...!

  45. AlexisHi guys. frankly I'm amazed finish watching this tutorial and I was the mask. One question I have I use Avira which has firewall. Honestly I'm not a computer genius of the Avira firewall is good?
    So I had to ask. Otherwise keep up the good work guys I'm sure many people f tutorialel help you. Thousand one I have been most helpful. Bafta

    Avira Internet Securyti If yes, has included a firewall, if Avira antivirus then just antivirus antivirus you see names followed by Internet Securyti then know that antivirus that owns or has a firewall, that is a suite of Security!

  46. Adrian:
    Avira Internet Securyti If yes, has included a firewall, if Avira antivirus then just antivirus antivirus you see names followed by Internet Securyti then know that antivirus that owns or has a firewall, that is a suite of Security!

    I installed Zenealarm pro and I am confused with allo and denyed vz 10 ip to block any minute so I did not see until now do not use the windows firewallu as Zone Alarm is good pros that with avast professional 4.8 to u to bag ativirus with a firewall in it?

  47. Adrian:
    And just think if it was Bindi k whatever you k author was stupid to confirm how you get the data on to him? =)) And sit and think about it ... if you go to someone in PC you go and say you want to do, what you do or what you did? =))) Bottom line? ARE NAIVE!! Very naive ...!

    boy tutorial version presented above is the mean free mocha gartuita in Translation idiots because of this server is BIND

    the private version does not have such a thing included ………. by e-mail how do you know that something is being sent have you seen the source of the program or what? or do you speak so as not to be silent?

  48. Kalithea said

    Crisis: Excuse me but you stupidity is really great! I make tutorials ... and how to install and messu and wieru team as well CREC walk .. and knows how to walk with tea bunicamea m Wier (to use), any dumb retart ...

    My parents have problems with the new Y! M and have no idea to use team viewer. You think you're too smart?

  49. Very interesting and complicated FORTE Thanks

  50. For Admin and acquaintances!

    >>>>> I don't want to open a controversy with those who feel like arguing and take the loom in the middle !!! <<<<<

    Hi there I do not misunderstand, but if that will download tutorials used asha cv, as they can get by with their real IPs, even if you give money???

    I say this because I download a lot of material from sport.ro and I would like to know if I am banned from real ip or if the new one is created…

    although I don't think I'll be banned because they have a lot of traffic, I would ask for my safety…

    In order to be as compact as possible in the comments [as cristi told me some time ago], I would like to ask you? nush if you give me an rsp, but: With what kind of program do you think I could download d on Gsptv.ro… I just can't… is there a special player? or c? and if you don't know or haven't entered that site, I advise you to use that CV so as not to allow the "unruly" to make fun of your work !!
    mc anticippat

  51. Hi
    Can you help me to make a pps
    thank you very much

  52. DIX:
    Hi
    Can you help me to make a pps
    thank you very much

    Yes we can orient yourself, so here's another one:

    http://www.google.ro/search?hl=ro&q=cum+faci+pps&btnG=C%C4%83utare&meta=

    and hence:

    http://www.google.ro/search?hl=ro&q=cum+se+fac+pps-urile&btnG=C%C4%83utare&meta=

    and hence:

    http://www.google.ro/search?hl=ro&q=how+to+create+an+pps&btnG=C%C4%83utare&meta=
    and hence:

    http://www.google.ro/search?hl=ro&q=make+an+pps&btnG=C%C4%83utare&meta=
    No, it was so hard to find out how to make a pps that he called an ambulance videotutorial.ro. God, I can't anymore.

  53. Corleone said

    Adrian: And just think if it was Bindi k whatever you k author was stupid to confirm how you get the data on to him? =)) And sit and think about it ... if you go to someone in PC you go and say you want to do, what you do or what you did? =))) Bottom line? ARE NAIVE!! Very naive ...!

    This version did not get it from the pharmacy I do know from what sources provine.Si start
    1. I said nothing of BIND looks like you do not know the term (bindajul the addition of a Trojan with a particular type of file.
    2.Daca was a BIND as you say that I supported would be to not be detected bindajul once did cover that file and no longer feels antivirus (Termidor itzi says something)?
    3.Nu I stand now and tell you know what cookie remains after visiting that site
    Hugo and I said that my password is wrong on the server that is installed along with the program not after I installed the server normally be given to the victim (ie the one that auto-install the program again) It seems that many runs and that is why what pricep.In not held to Moldova but so is ste not affect the video quality that's smart and make him buy that program now is mocha, and present it as can or how financial stie.Partea's the last thing I intereseaza.Pe that site I was banned just for the reason that I realized how some software works by acolo.Xardas adescoperit make one thing: for the time suckers and naive will also be trick, but I said I discovered that not that he invented TZin cont.Suntem a free country should do and say what we want so everyone is free to believe what he or she wants to choose when it comes to visit on a particular site, hellsoft not think has the best tutorials and also do not think it would catch up with the rate of visitors to this site.

  54. Corleone:
    This version did not get it from the pharmacy I do know from what sources provine.Si start
    1. I said nothing of BIND looks like you do not know the term (bindajul the addition of a Trojan with a particular type of file.
    2.Daca was a BIND as you say that I supported would be to not be detected bindajul once did cover that file and no longer feels antivirus (Termidor itzi says something)?
    3.Nu I stand now and tell you know what cookie remains after visiting that site
    Hugo and I said that my password is wrong on the server that is installed along with the program not after I installed the server normally be given to the victim (ie the one that auto-install the program again) It seems that many runs and that is why what pricep.In not held to Moldova but so is ste not affect the video quality that's smart and make him buy that program now is mocha, and present it as can or how financial stie.Partea's the last thing I intereseaza.Pe that site I was banned just for the reason that I realized some softwares working decum acolo.Xardas advantage adescoperit one thing: as much as they are suckers and naive be and tricks, but I said I discovered that not that he invented TZin cont.Suntem a free country should do and say what we want so everyone is free to believe what he or she wants to choose when it comes to visit a particular site, hellsoft not think has the best tutorials and also do not think it would catch up with the rate of visitors to this site.

    I do not understand why you quoted me in your comment ... I was holding you and my comment was for NoName.Am ft understood well what you are doing and how it works ... no need to explain to me but that NoName !

  55. Corleone said

    Romeo: X5O!P%@AP[4\PZX54(P^)7CC)7}$EICAR-STANDARD-ANTIVIRUS-TEST-FILE!$H+H*

    It depends on the settings of each AV.Unu is set to find only when a task is carried altu is set to jump to her face just the slightest suspicion.

  56. Corleone said

    Adrian: I do not understand why you quoted me in your comment ... I was holding you and my comment was for NoName.Am ft understood well what you are doing and how it works ... no need to explain to me but that NoName !

    Then I missed my friend who does not work is not only wrong.

  57. Corleone said

    dumitru32: Good tutorial, good that you have started to learn the world in this area ... I have a question that is not necessarily svchost.exe virus, or it may be a process in the system? In my task manager shows me that there are two svchost.exe ...

    Do not worry once you have same or videotutorial locatzie that came after problem.Sunt not install any software system processes.

  58. Songoku20 said

    j0k3rul: Honestly tutorial poor way to know that the guinea pig Hellsoft reach anyone and no one is forced to download / buy those software, software is downloaded at your own risk (dot) Xardas sold out for this software because it is created by him and I is it normal to get some bucks from restricted access likely not work lui.Ai stopping by category generall Rules goodbye

    If I'm not mistaken you're one of the site and if I'm not wrong guy again you are and administrator. I think it would be good to give to the police because some retards are not making the PC rather than to take your computer to other people. And for what? Catch them as they look at porn? =)) Or to take family photos in your PC? And what they do? Wed honest even I'm not afraid of people like Xardas guy. That's because I do not keep important nimik PC. All photos and important files to DVDs hold them and will recommend to you to do the same. Bafta!

  59. dumitru32 said

    NoName: Weak tutorial Mr. Corleone, in addition to being pretty stupid comment (perhaps you molvodean) and observe that you are poorly informed about this application.
    1. The application is no longer offered for sale for more than 10 months it was not illegal because it was created by someone and has every right to publish it as believed.
    2. HellSoft.ro site is NOT a virus and not get one as guinea pigs, each is free to download and use files from there onto your account, no one is obligated to buy something.
    3. Version you just presented is one BIND server with CLD your data does not get the email not know what the creator, even when you do not get connected anywhere you permission because data ... make a connection between you and the victim's PC ! Uninstall software and does not include a server version is sold directly from the author was NOT BIND.
    Next Time May documenting then you can create tutorials

    What do you have with the Moldovans ??? Come to us in MD and we will make you love them :))…
    I do not understand you're jealous Corleone can do a tutorial or even you're the author of that program??

  60. frankly much the order information, but I must say one thing, do not know exactly who adminstreaza this site, I liked the arrogant response received
    webdan says:
    Na, it was so hard to look how to make a pps that a ambulanta.Ioi Lord called my mother ... I can not ...
    anyway thanks guys that adminstreaza site for information received, even not all are specialists in PC,

  61. :))))) I know some guys who used it to hell… .what they took… .. :)))).
    VOD Corlea

  62. DIX: Honestly much the order information, but I must say one thing, do not know exactly who adminstreaza this site, I liked the arrogant response received
    webdan says:
    Na, it was so hard to look how to make a pps that a ambulanta.Ioi Lord called my mother ... I can not ...
    anyway thanks guys that adminstreaza site for information received, even not all are specialists in PC,

    You must not mind, really Webdan was a little mischievous, I edit that comment, Webdan not part of the management team of this website is a visitor but as you Webdan helped many visitors and unlike others is more active on here, I'm sure they did not say it with malice, just joked.
    When you made that comment, and give us new details, are many who come here and write reviews elsewhere and therefore you do not foate taken seriously, jokes, many are cool.
    Now we realize that you really have a serious inquiry.
    Unfortunately we have PowerPoint tutorials in the future I'm sure that we have put then maybe find something useful on our website.
    We have something nice for you, even more interesting than a PPS.
    How to put pictures and how to publish on the Internet a photo album, video tutorial
    I hope you do not mind the new fun way in which you responded Webdan.
    Stop waiting for us.

  63. Webdan please me to be sympathetic to those less experienced, you do not know you all from the beginning.
    Beginner visitor comes to us and when I saw so many tutorials discourages, does not know where to look first, sure it's easy to use search engine or categories Drop-Down but maybe people do not know what to do.
    And google is easy and find any, unfortunately do not find in Romanian, so people ask us for help.
    Let's show some understanding of beginners, we were all beginners.

  64. cmehedintu said

    Congratulations Corleone nice and good to put my head in the note 10

  65. Corleone said

    I went to the boys for a while to know that not everyone is a Xardas fan there e there are also smart people but most of them are BUBUIE. They have come to contradict each other, in fact they don't realize that one can be logged in and as an admin for example to log in as a supporter of that boy !!

  66. Corleone: When it comes to visiting a particular site, hellsoft not think has the best tutorials and also do not think it would catch up with the rate of visitors to this site.

    you still have a lot to eat until you reach this poor site with the level of hellsoft… you say corleone and draw water in the toilet 🙂 Good luck

  67. Nice tutorial, I watched from beginning to end, and I happened something like a keygen but now a 2 years, then not open any file that seems suspicious.

  68. rootalkin said

    Constantin Necula (Corleone)
    I have a question about the program submitted. I am a linux user.
    What chances does a user who uses this program to enter a computer that has the Linux operating system?

  69. dumitru32 said

    rootalkin: Constantin Necula (Corleone)
    I have a question about the program submitted. I utilizatorde linux.
    What chances does a user who uses this program to enter a computer that has the Linux operating system?

    I don't think he has a chance…

  70. rootalkin: Constantin Necula (Corleone)
    I have a question about the program submitted. I utilizatorde linux.
    What chances does a user who uses this program to enter a computer that has the Linux operating system?

    There can be no question, this soft Corleone is presented for the Microsoft Windows platform, this program can not run on linux.
    In other news to know that linux can be spied on Maiu really nice if you give someone access to your computer, so be careful on whose hands leave the computer.
    An experienced linux user does not need more than 2 minutes to "prepare" your computer.
    Pay attention to FTP servers, even if you install it you take great care in settings.
    Pay attention to SSH servers, if anyone knows the root password, when you installed SSH server can take over without any problem full control of a computer operating system Linux.
    Neither linux are not safe from hackers, I can say that in some cases you can go faster on Linux than on Windows, on Linux really are not viruses but that does not mean you are vulnerable in other ways.
    Security is as important on Linux and Windows.
    I posted these tutorials by Corleone to show our visitors that no viruses or Trojans are the only problem when it comes to threats.
    In my opinion the human factor irresponsible or malicious is most dangerous for a computer system.

  71. Hello,

    I have kindly if they could make tutorials on Office suite (Excel, Word, Acess ..). And I want to thank you because without help us learn to use certain software programs to make life easier ..

  72. Corleone but I also want to do some tests of this software "Remote Control3.0" that I have a 40 GB HDD and I put it on the PC in case someone steals documents and other things from my computer or deletes them Oh, but I want to do some tests, you could upload that program or send it to me by e-mail because I want to make it clear that it is no longer dangerous and to find a solution because I can't find it on the net. can you help ???
    and maybe there is a solution to that software not to be us guinea pigs :))

  73. Corleone: I went at least of guys all know that there are fans and the world's Xardas ... but most BUBUIE.Au smart enough not actually contradict each other and realize that one can be logged in as admin deexmplu and log on as a supporter of that boy!

    Let's try not to promote this website, advertising costs, was mentioned in the tutorial, I think that is enough, people will keep from now on.

  74. daniel: Hello,
    Asavei rugaminteadacas-arputeasa tutorials make pachetulOffice (Excel, Word, Acess ..). And I order that multumescfr sava neajutatisa safolosim certain programesoft learn to make life easier ..

    Please write above the Search so: Microsoft Office, hit enter and you will find a tutorial! I hope you'll help, good luck!

  75. Corleone said

    DMX: You have to eat more to get you with this lousy site of the hellsoft ... say Corleone and flush the toilet luck!

    It depends on what you want to present in a site, yours will be good only by the fact that you can find suckers who put a snout and…. I don't have much to criticize, at least you know too well 0 + 0 can only be equal to… count you. But for all who believe in you I tell them once the program is free, it has no hidden parts, it has no Trojans why don't you have it in the dawnload section download button to write like this "programs created by that jambilici "Not that he says it's not from him or blah blah blah. It's the program from him he doesn't recognize because he's put in the position of a ckinder who doesn't know how to take responsibility! He changes the radmin, he puts a bouquet of flowers, it's not what the hell you're licking and it's ready, the big jagardel sells cld.

  76. Corleone said

    dumitru32: I think he has no chance ...

    So what I do not know do not jump, it would be unfair to advise you that I do not know Linux from a hard putzin than my virtual.Parerea: Do you sinkholes!

  77. Corleone said

    gepeto: Corleone but I want to do some tests and the soft "Control distanta3.0" I 40 GB HDD and stick it on the PC guy in case someone steals my documents and other issues in the computer or delete them not bathrooms but I fc some tests, you could upload that program or send email mil ptr I want to figure it out not to be dangerous and to find a solution that you do not think I can find net.Ce help?-and maybe there is a solution to software that we be not to guinea pigs)

    Then your beard will grow and you will be old until I give this search program can poate eat you badly 🙂

    Corleone: So what I do not know do not jump, it would be unfair to you advising me that Linux does not know him than putzin of hard virtual.un

  78. this tutorial is stupid… ..I propose to the admins to document themselves… ..and not to talk nonsense… and for the fans who approve this tutorial… .you also learn umpik;) why would Xardas want to do harm to everything the world??? ps the program is for money… and does not force anyone to buy… ..who wants good who does not…

  79. Interesting tutorial!
    It can be said that everything has a price, you want to spy on another..you want to be spied on yourself… In my opinion the solution would be to install the spy software on a fresh install pc, where there is nothing interesting for you. the one who eventually tries to spy on you..or, better a picture with an exciting name and inside a virus that will fry your hdd without the right to appeal… 😀
    As for the ones on the list… probably that list is just dust in the eyes, because the programmer when you open the pc, and you connect to someone, he anyway "sees" all the movements you make, and receives information about what ip- You call… Anyway from what I saw, there are so many warnings and confirmations that need to be given, that very hard, and only knowingly, you can fall into the trap.

    Pt. admin: I noticed long ago that I was denied access to the site, probably because I tried to see a tutorial that does not work than sound (like about w7) and not knowing what is vb, I tried multiple browsers and can somewhat overlapped requests, I do not know, the idea is that they can not enter the home, just search on google and click on the link ..
    So I'm going to work on site as well as home, home to work to solve the problem for now persista.Mentionez as we work DHCP, static IP at home.

    PS Mine was supposed to be the first comm, but is the 78 century, because I wrote it at work but I sent him home ..: (

  80. Kalithea:
    My parents have problems with the new Y! M and have no idea to use team viewer. You think you're too smart?

    Yes I think and what you eat you somewhere? then scratch and teach your parents to use Team Wier ..

    And for those losers who say that the site contains viruses, for example: (Santa Corleone)… it doesn't matter if you're smart!

  81. Corleone said

    CrisisYes I think and what you eat you somewhere? then scratch and teach your parents to use Team Wier .. And to miss these guys who say that the site contains viruses eg (Santa Corleone) ... do not count nik smartass!

    Ok do something on it and blame me, just too DJpala already as children will contradict you say it's free when it's on bani.Voi You guys are sent to gascanu that?

  82. CorleoneOk do something on it and blame me, just too DJpala already as children will contradict you say it's free when it's on bani.Voi You guys are sent to gascanu that?

    Corleone give them peace… it was clear that if you shake them and make a bad advertisement for them (you revealed that their software also contains that autoinstall server, which has no logic ... except the intention to spy on you ...) and they will lose potential customers, they will jump on you to defend their business…

  83. Corleone said

    Neagh: Corleone give them peace ... it was clear that if you do them scuffed and bad press (you revealed that their software contains the server AUTOINSTALL, who do not have any intention of logic .. than you spy ..) and they will lose potential clients, or to jump on you to protect their business ...

    That's right, but I didn't offend anyone, and even if I do, I'll do it within my common sense, so I'm not afraid of them. All they can do to me is either take my oxen off the bike or children from tziava… .we have nothing to do with such people… jump up like a shell when the chicken hawk approaches. 🙂 🙂

  84. You've been at it again. Congratulations Corleone!

  85. Corleone:
    Ok do something on it and blame me, just too DJpala already as children will contradict you say it's free when it's on bani.Voi You guys are sent to gascanu that?

    where you see that we disagree 2 software is available in free versions one that is the one of you and that is found all over the net and one on money, not private therapy is available on the internet that you buy from Xardas and not contains the server

    as for the n00bii who comment …… no comment

    [[to be a hacker is a dream ……… to be a hacker is a nightmare.]]

    Have a nice evening

  86. j0k3rul:
    where you see that we contradict our software is available in 2 versions, one free, ie the one you have and which can be found everywhere on the net and one for money, private which is not available on the internet, you buy it from xardas and which does not contains that servercat about n00bii commenting ……… no comment [[being a hacker is a dream ……… being a hacker is a nightmare.]] Have a nice evening

    You still have halal of mirc language, of the corner of the block I imagine what kind of aspirations you have and what kind of jaxorel you are… by the way… one of you said above that if we speak ill of “boschetu… sorry bossu ”Yours, o patim rau !! I'm still waiting or….? did he forget about me =)) (Above I spoke ill of your "boss", I left a comment on him, and you as arrows and puppies that you are should send him the ugly words as you have done so far, are you arrows or puppies?)

  87. Adrian reads below …….

  88. j0k3rul: Adrian reads me. Remote control is available in 2 versions (period) please if you want I will draw you but this will be possible in another episode

    Aha… you were referring to me since you quoted Corleone… so .to whom did you refer in the end ??? =)) You have emotions, I understand you perfectly, it's natural…

  89. dumitru32 said

    Corleone:
    So what I do not know do not jump, it would be unfair to advise you that I do not know Linux from a hard putzin than my virtual.Parerea: Do you sinkholes!

    I do not know Linux, Windows actually no, but from what I hear on this site and from what I read on the other, Linux is completely different from Windows. I think the author of that program must do it again to work on Linux.

  90. j0k3rul: Adrian reads more ………. Remote control is available in 2 versions (period) please if you want I will draw you but this will be possible in another episode

    Why you should use this limited language, it seems that you can not more intellectual capacity in the road when you let your baby's world.
    I can not approve of yourself from now on.
    One is a discussion on solid and the other is to start to break the figures behind the keyboard.
    Hate to offend all of you people on this site.

  91. Jok3r… set yourself on fire with that line (being a hacker is a dream). I don't understand what the makers gain from this thing. To steal or delete the data of simple children who are stolen by these fake programs. If you still get big hackers (infected parasites) break the godmother or other bigger companies!

    GG Corleone!

  92. Mr. j0k3rul if you shared something with someone please express yourself in decent limits.
    I do not understand why you attacked so if no one is guilty of anything, can be very nice to send an email with arguments designed to counter the statements of Mr. Corleone in tutorial.
    I think it came out much man cave, you have to courage to go out and you do, it's nice outside!
    A refutation of arguments expected!

  93. Do you hear that bro: Remote Control by Xardas.
    What a style… ..what finesse …… what modesty!
    Windows7 by Bill Gates.

  94. Corleone said

    j0k3rul: where you see that we contradict our software is available in 2 versions, one free, ie the one you have and which is found everywhere on the net and one for money, private which is not available on the internet, you buy it from xardas and which does not contain that servercat about n00bii who comments …… no comment [[being a hacker is a dream ……… being a hacker is a nightmare.]] Have a nice evening

    Well, I want to get you out of the fog and tell you that that program is right from that azorel taken by someone who paid for him some euros but… .it doesn't make sense to discuss this topic. This site does not aim to bring insults or accusations to anyone. I want to tell you that I have something to argue with what is written or presented here, moreover I can initiate a certain action against… and if I don't have time now for something like that I guarantee that someone will do it. on your site there are many who bought the program from that azorel and found that they ran into this problem (of course after seeing what I presented)

  95. FOR JOKERU a real jaxorel does not waste his time breaking ids like you and setting up the country only by words and without deeds !! a true jaxorel does not risk his skill and freedom "stepping" in the p-cures of innocent children, unskilled people, true jaxorees have other purposes much bigger and deeper, exactly what was said in the commentary text which more than likely did not you read, a jaxorel is an articorporatist, not even a simple citizen hacks his pc, you don't know the term and the notion of hacker, you are just a jaxorel, not a hacker !! You are a child who dreams too beautifully, and when he wakes up, he will wake up somewhere behind bars placed in a window that you will not even reach on top, there is the place of those on that site infected full of enthusiastic children of “the art of becoming a jaxor” !!!

  96. no links !! .................. ..
    That's HACK!

    I think you exaggerate the title of this tutorial Corleone mha

    It is a trojan missed that were not even able to create it from scratch!

    For those who sell it are just a name: script kiddies

    Team Viewer only fans of Bill Gates and 10 years children use it when trying to fix each other I do not know what the problem in yahoo mess.

  97. and corleone… I'm not sending anyone… just k I used that program for a few things some time ago when it was undetectable 3.0… ..and it really helped me a lot… ..now nush what happened to that version ke detectable and it keeps talking the world of evil… ..but it appeared 3.2 that I assure you k dak you would see how much it can do and how easy you would be amazed… and you would not comment k see god you will be the victim of the creator :))

  98. The real "hacker" is Adrian…. acting from the "shadow"

  99. gandhall said

    I'm glad that evil is counterbalanced (in this case by Corleone), reminiscent of the battle between good and evil personified in the Star Wars by the 2 Jedi. The first thing I think about is to realize that that Xardas fell on the negative side of the force while Corleone is a jedi co-opted by the positive side of the force… a computer jedi of course like those who do these tutorials

  100. Corleone said

    Pala: And Corleone ... anyone ... just not sent k we used the program a few things that one a while ago when it was undetectable 3.0 ..... and really helped me very much ..... now nush what happened to that version and all detectable ke speaking world of evil ..... but appeared 3.2 k dak assure that you can see how many and how easy you will be amazed ... and you have no comment k see ladies going to be the victim Creator :))

    I think it was scanned with virustotal. If you say that the newer version is better, it can be…. So be it… but for how long until it is sent for scanning or until someone finds something chichite and there and …… ..

  101. Corleone said

    gandhall: I'm glad that evil is contabalansat (in this case Corleone) remember the fight between good and evil personified in those 2 Star Wars Jedi. The first thing I think, is, to realize that that Xardas fell into the negative force while Corleone is a jedi force recruited from the positive side ... a jedi course information and those who do these tutorials

    You should know that on this site you have just learned things and utile.Inainte the presentation of a program in front of you that the program is tested, tried even by one who makes videotutorialul.Dativa realize that this is not something that anyone would damage your PC from stage to stage ideas and videotutorial is a long way, the time, expense Therefore please try some even if one of the authors criticize the limits of common simt.Numai facetio who does not work does not make mistakes!

  102. sorry I meant "Xardas" is the real hacker acting from the shadows.

  103. I hope you don't mind, but you kind of hit it off with your ip. no one shows their own ip. no matter how good you are you don't do anything but so many kids to prove to you that you are vulnerable. and they will succeed if they insist. all the more so as you on this site, by what you do you make their work difficult, showing the beginners how to protect themselves against them. about hellsoft the site is clean, not he has infections if you visit him and that's it. such sites are always clean (is it about honor among thieves?), but if you stay too long on them surely "blackhats" will test you to see how you are with security. I wish you good luck and continue the excellent work you do.

  104. roger: I hope you do not mind, but you kind of gave the post to phase ip and show ip tau.nimeni not propriu.oricat the good you do nothing else than to prove your Runts Prove that you will succeed if insista.cu vulnerabil.si more so as you on this website, which make them more determined, showing beginners how to protect them against lor.cat hellsoft about the site is clean, not if you are visiting and atat.intodeauna infections such sites are clean (be it an honor among thieves?), but if you stay too long on them definitely "blackhats" will test you to see how is your security. I wish you continued good luck and continue the excellent work they do.

    More terminally good people with nonsense !!! I see deserters everywhere throwing things in front of you like "you see I have your ip… do you want me to leave you without the net ???" I die when I hear this phrase… so if you have the ip what? Do you think that being a hacker is all about knowing the ip of the person you want to hack? Especially since now more and more companies offer dynamic ips, which change every time you restart your pc or internet connection (for example RDS) so in vain I give you my ip now, if I give a restart on the pc I have another… and ?? what are you doing with that ip you have ?? Don't be children anymore and don't listen to all the "skilled" and all the jaxoreii, to find out my ip you don't have to be a hacker, anyone can find out an ip !!! If you found out an ip you don't call yourself a hacker !!!

  105. For those who want to be hackers:
    1) must learn more about the PC.
    2) Make sure you learn from the best.
    3) Create your own software and other documents for others not to fall into place.
    4) Even if you are naughty, you must be serious and not loud.

    Or rather you stay levelheaded not gain anything from it.
    Respect and be respected.

  106. Corleone said

    roger: I hope you don't mind, but you kind of hit it off with your ip. nobody shows their own ip. no matter how good you are, you don't do anything other than have so many kids to prove it to you that you are vulnerable. and they will succeed if they insist. all the more so as you are on this site, by what you do you make their work difficult, showing the beginners how to protect themselves against them. about …… the site is clean , it has no infections if you visit it and so on. such sites are always clean (is it about honor among thieves?), but if you stay on them too long surely "blackhats" will test you to see how you are safe .I wish you good luck in the future and continue the excellent work you do.

    Do not worry I know what to do, in terms of ip will have to buy more razors that will be beard before I break down on me clean that site does not create Cooke, and depends on what kind of cookie , I'm glad you like it come this way!

  107. Corleone said

    niku: Sorry I meant to say that "Xardas" true hacker is acting in the shadow .......

    From Adrian to Xardas's way so long as thousands of years would be to catch his Jaxorel! If quoting mistake altu believe you, so you did not do than take my toothache, you made me laugh!

  108. Corleone:
    Do not worry I know what to do, in terms of ip will have to buy more razors that will be beard before I break down on me clean that site does not create Cooke, and depends on what kind of cookie , I'm glad you like it come this way!

    Necessarily want to clarify something very important.
    Cookie is not a virus or malware otherwise, any site currently uses cookies.
    When you enter yahoo mail and check that box with "remember me 2 weeks", well then a cookie comes into operation that saves you the unpleasant task of entering the password every time.
    It was just an example of what a cookie.
    No more frightened cookies so that they are not bad.
    Another example that is not related to computer but can be something like a cookie behavior, when you go into a bar and ask the bartender a cola, if you come a few days in a row that bartender will remember you and will not ask every time you drink, so it is with cookies.
    Of course cookies are more complex and are designed to follow you as you visit an online store to serve you with targeted advertising on your profile, no that's not a bad thing, any serious online store uses this technique.
    All use cookies: Google, Yahoo, YouTube, etc..
    I hope to see things with different eyes from now on, at least in relation to cookies.
    If you are more paranoid by nature, you can set your browser to clear all cookies at the end of each session, ie each time you close the browser, but will say more to lose than gain, it is ultimately your choice.

  109. Please dak you can put in the "throat" such a prog to tell the truth about these 2 lei Hackers who come out kill receive… MORE DETAILS about Hacker actually I want the truth that no one dares TUPEU to say… app after the nose clip wants to fiu hacker… .BRAVO VideoTutorial… datileo asa merita
    Another thing I think has to do with hacking from above (from the president to the last minister)… the truth will come out once… ANTI HACKERS

  110. Corleone said

    Cristi-admin: Necessarily want to clarify something very important.Cookie is not a virus or malware otherwise, any site currently uses cookies uri.Cind get on yahoo mail and that the checkbox "remember me 2 weeks "Well then come into operation on a cookie saves you the unpleasant task you enter the password each data.Acesta was just an example of what a cookie.Nu longer so scared that cookies They are not rele.Inca an example that is not related to computer but can be something like a cookie behavior, when you go into a bar and ask the bartender a cola, if you come a few days in a row that bartender will remember and will not ask you every time you drink, so it is with cookie cookie urile.Bineinteles are more complex and are designed to follow you as you visit an online store to serve you with targeted advertising on your profile no that's not a bad thing, any serious online store uses this tehnica.Toti use cookies: Google, Yahoo, YouTube etc.Sper to look at things with different eyes from now on, at least in relation to cookies. If you are more paranoid by nature, you can set your browser to clear all cookies at the end of each session, ie each time you close the browser, but will say more to lose than gain, it is ultimately your choice.

    Normally we will lose connection will be made harder, I just refer to what is retained at one site or that site that holds about you.

  111. Fedayn: Please dak it still might give the "neck" progs also tell the truth about these hackers get de2 lions kill ias ... more information about the Hackerealadefapt adevarulca I want him to tell anyone ... ing nerve app after nose clip vreasa be hacker .... BRAVO VideoTutorial ... so worth datileo
    Inc. a chestiecred k GRT with hackrelalaie top (from the president to the minister ultimu) ... the truth will come out once ... Anti Hacker

    We do not try to be "anti-something", I just submitted a tutorial on what happens.
    People need to know everything, we believe it is important for the user to be informed.
    We do not have user agrees that broken computer that can not come to us, joking .....
    People still did not understand everything that is wrong with the PC world was created by some people.
    The first enemy of computer is man, even the most wretched virus in the world can cause more damage than a malicious user.

  112. Do not forget that viruses and everything bad in IT is also created by the human mind, all human!

  113. Guys, I have a problem with NOT ME BIOS Q-Flash menu appears, even if I have a BIOS floppy NEW, why do not know? PLEASE if you could take another TOTORIAL WITH BIOS FLASHUIREA another way if possible!

  114. dumitru32 said

    Cristi-admin:
    We do not try to be "anti-something", I just submitted a tutorial on what happens.
    People need to know everything, we believe it is important for the user to be informed.
    We do not have user agrees that broken computer that can not come to us, joking .....
    People still did not understand everything that is wrong with the PC world was created by some people.
    The first enemy of computer is man, even the most wretched virus in the world can cause more damage than a malicious user.

    Well, not all viruses of registered users is creating malicious??
    When I was younger, I thought is enough to comp you to become hacker, now I understand that you have to know very much and very good programming to do a virus or trojan.
    By the way, what if you talked in a tutorial about programming languages ​​and how to create these programs… ???

  115. Corleone: Do not worry I know what to do, in terms of ip will have to buy more razors that will be beard before I break down on me clean that site does not create Cooke, and depends on what kind of file Cooke, I'm glad you like it come this way!

    You should know that there is still a problem with ip. Here is an example: some time ago we were working at a net club, the service part, station maintenance and we had younger colleagues who were talking to each other who wondered mir When they couldn't nervously, they found out the other person's ip "/ whois" as if .. and without too much care they flooded him while he was pinging on him… I immediately saw how the losses are getting bigger and in the end he didn't answer at all… he fell the net..I understood that 2-3 hours… Of course the “fun” was sometimes penalized for blocking the server and finding out from which station the flood occurred..but the damage was already done… and the fault fell on the client which was probably at that station..I wasn't very interested in these things but being there I saw them..Of course these were possible because "the other one" only had a big mouth, but he didn't even know how to hide his position. on mirc… I am convinced that these things are still possible .. I also saw how they broke sites with the help of some "Exploits", but they only broke to get to work, they didn't know what to do next and there was no interest, they just made a print screen and bragged about it to others… who managed more than that…

  116. Jak: Guys, I have a problem with NOT ME BIOS Q-Flash menu appears, even if I have a BIOS floppy NEW, why do not know? PLEASE if you could take another TOTORIAL WITH BIOS FLASHUIREA another way if possible!

    It doesn't appear to you because you probably have a PC or rather an older motherboard and you don't have support for Q-Flash, the method for you in this case is more delicate and I can't explain it in a comment, you have to format a diskette in MS-DOS blah blah to boot from it… search google too you will find a documentation!

  117. Jak:
    Guys, I have a problem with NOT ME BIOS Q-Flash menu appears, even if I have a BIOS floppy NEW, why do not know? PLEASE if you could take another TOTORIAL WITH BIOS FLASHUIREA another way if possible!

    Hi jack. In order to do an UpDate to the bios ("flashing" as you say) you have to be very motivated. Update the BIOS only if the motherboard necessarily needs a BIOS update. I know, for example to recognize a component that you are sure will work after the flash of the BIOS. Another important detail is the version of BIOS with which you want to flash the bios (not the same version), and the most important as this version to be valid only for your motherboard. Otherwise you risk destroying your motherboard and hello… you can throw it in the trash. Good to assume that you have taken everything you need and how you want and you want to update the bios. For this it is recommended to have the computer powered by an interruptible socket, because if the computer accidentally turns off during the BIOS update: you can throw your motherboard in the trash. Well, enter the BIOS and set the boot to be done after floppy. Save and exit the BIOS. After the computer has restarted enter od bootable floppy disk from windows 98, and let it do its job until the cursor “A: \ _” appears. After this cursor appears, insert the floppy disk on which you have the executables and other files necessary for the BIOS update. you inserted this diskette with the executables write the command "DIR", that is on your screen will be the cursor "A: \ _" and after it write the command "dir" and press the "enter" key. After pressing enter "You will hear a noise because it is read from the floppy disk and all the files and executables that are on the floppy disk from which you want to flash the BIOS must appear on the screen. You look carefully to see which ones the executable that needs to be executed to flash the BIOS, and which is the "bin" file. It's hard to explain in detail what you have on the floppy disk from which you want to update the BIOS. But if your computer can't boot from the floppy disk then there are programs that "turn" the sticks into a floppy image. No, success and I hope you do well, butif it eats your ass to update your BIOS so "miss the lily", I suggest you stay calm…

  118. Jak:
    Guys, I have a problem with NOT ME BIOS Q-Flash menu appears, even if I have a BIOS floppy NEW, why do not know? PLEASE if you could take another TOTORIAL WITH BIOS FLASHUIREA another way if possible!

    Agree with webdan, the greatest danger to update the BIOS is to disconnect your power, and if you have a suspect bios problem better leave him alone ..
    I used that Q-flash, I went on classical methods and I crashed (so far ..: D) any pc ..
    I do the following: I went on the site and searched the motherboard manufacturer and BIOS flash program uire .. I even found the old boards flash program that runs from Windows (WinFlash). That depends on the BIOS ( Award, Phoenix ..)
    So if you found something like WinFlash is perfect, I'll go in Windows, and have the file with. Bin is propriuzis bios .. and you have to save it on the desktop and the execution WinFlash to give way to this ..
    In principle, if the BIOS is wrong, will not go and will warn you trying to install the wrong version, plus it allows you to make a copy of the old BIOS in case you decide to reinstate it back later.
    If you do not find this utility like winflash, but only awdflash let's say .. this only works from DOS. In this case you format (from WindowsXp, right click on Diskette, Format ..) a diskette with the option "Create MS_DOS startup disk" after which copy the flash utility and the .bin file to the floppy disk
    Are you sure your PC buteaza from floppy, put the floppy and boot up your PC, and wait until the prompt appears, and then write it to: Awdflash.Exe bios.bin
    program starts, check if the BIOS you want to burn it fits your board basis and asks if you're really sure what you want .. and before that, if you want to save the old one.
    On the floppy disk you have to copy the 2 files right in the root, not in the directories, otherwise you have to give the full path to those directories and you get complicated, and the extensions must be written. I only wrote here as an example "winflash", "awdflash", maybe what you find will be called differently and then you give the appropriate name. Also the bios has a tangled name but at the end it always has the extension .bin. The bios has several components, the program can ask you what areas you want to flash, in principle if everything update choose everything.

    Good luck!

  119. THANK YOU

  120. I am pleased, MSI: K9AGM3-FD, AMD 690G CHIPSET, SOCKET AM2, a lawsuit CAM Old + 4400, and want SAI make a Correct as BIOS that could support a CPU AM2 + Phenom hope it will work on the advice that I LAT DAT Thanks

  121. Jak:
    I am pleased, MSI: K9AGM3-FD, AMD 690G CHIPSET, SOCKET AM2, a lawsuit CAM Old + 4400, and want SAI make a Correct as BIOS that could support a PROCESORAM2 + Phenom hope it will work on the advice that I LAT DAT Thanks

    I searched for your board and the method does not work what I described, fiidcanu have flash utility on the site, only BIOS Update., You probably should go with that q-flash.S flashuit could go scored biosu (is Ami) for a utility. biosuri Ami, but it is better Download here http://www.msi.com/index.php?func=downloadfile&dno=4862&type=utility
    is an online utility updates the BIOS will probably go something like I can not install winflash.Eu to me to test it much more, to see what menus / options would be, because I have the plate basic, and most likely will not go ..

  122. Jak: I am pleased MSI: K9AGM3-FD, AMD 690G CHIPSET, SOCKET AM2, a lawsuit CAM Old + 4400, and want SAI make a Correct as BIOS that could support a PROCESORAM2 + Phenom hope it will work on the advice that I LAT DAT Thanks

    Sit tight and do not update the bios nothing! soket AM2 not the same with AM2 +, in conclusion your motherboard does not support a basis for soketu AM2 + differ in size and settlement! AM2 + will not come into place for AM2! You must buy another motherboard!

  123. Adrian: Sit tight and do not update the bios nothing! soket AM2 not the same with AM2 +, in conclusion your motherboard does not support a basis for soketu AM2 + differ in size and settlement! AM2 + will not come into place for AM2! You must buy another motherboard!

    I do not want to be bad but ..

    Socket AM2 + is a CPU socket, Which is the immediate successor to Socket AM2 That is used by Several AMD Athlon processors Such as 64 X2. Socket AM2 + is a mid-migration from Socket to Socket AM2 a AM3When is fully compatible with Socket AM2, so processors designed for Socket AM2 That work on Socket AM2 + motherboards and vice versa.

    taken from wikipedia .. I put it sting ..

  124. Thanks helped me out

  125. Neagh:
    I will not be sorry .. but AM2 + is a CPU Socket socket, Which is the immediate successor to Socket AM2 That is used by Several AMD Athlon processors Such as 64 X2. Socket AM2 + is a mid-migration from Socket to Socket AM2 a AM3When is fully compatible with Socket AM2, so processors designed for Socket AM2 That work on Socket AM2 + motherboards and vice versa.taken from wikipedia .. I put it sting ..

    Thanks for the correction, I knew that one goes, I never had AMD but my knowledge goes, well ... make mistakes, that's ... I was misinformed, no one knows everything, well that is more fair! !

  126. webdanHi jack.Ca to do an update to the BIOS ("flash-uire" whatever) must be very motivat.Faci update the motherboard BIOS unless necesitaneaparat update BIOS.Eu know, for example, to recognize a component you sure sure it will work after flash BIOS ului.Un hate another important detail is the version of BIOS you want to flash the bios uiesti (not to be confort version), and the most important that this version will be available only for your board you risk ruining baza.Altfel and greeting card ... you can throw at gunoi.Bun suppose you got everything you need and want and how to make updates to this bios.Pentru it is recommended that your computer is fed to an outlet switches, because if the computer goes wrong during the BIOS update site: can you throw the motherboard in gunoi.Bun, enter the BIOS and set it to boot to be made by BIOS.Dupa floppy.Salvezi and out of the computer has restarted insert a bootable floppy from windows 98, and let her do chores until the cursor appears "A: \ _." After appearing This course introduces the floppy disk you executables and other files needed to update BIOS diskette that you have entered ului.Dupa to write executable command "DIR" mean to you on-screen cursor to be "A: \ _" after he wrote the command "dir" and press the "Enter" key. After you have pressed the "enter" you will hear a sound that is read from the disk and must be shown on the screen all files and executables that have floppy you want to flash -uiesti BIOS ul.Te look carefully to see that it must execute executable to flash the BIOS UI, and that the file 'bin. "It's hard to explain in detail what the nustiu of the disk from which you want to make updates to BIOS.Dar if your computer can not boot the disk from then are programs that "make" sticks in floppy.Na image, success and hope you get it right, but eat your ass if you do your BIOS update so "idly" I intend to stay put ...

    Excuse me, for different reasons (hectic and nervous day) I wrote without wanting that "For this it is recommended to have the computer powered by an uninterruptible power outlet." The source must be uninterruptible, so do not misunderstand, source it must be uninterruptible.

  127. Adrian: Thanks for the correction, I knew that one goes, I never had AMD but my knowledge goes, well ... make mistakes, that's ... I was misinformed, no one knows everything, well that is more fair! !

    No problem, nor I, nor I worked with procesoare.Nu also want to tell the configuration of your PC at home so as not to provoke a general hahaiala ..
    As a complement, all it says that AM2 / 2 + is not compatible with AM3 (number of different pins) as AM2 and AM2 + are compatible and that manufacturers have already included in biosuri MB (or updates) for changes. AM2 +, but unlucky for Jak, those from MSI said that their boards are not compatible AM2 / AM2 +.
    So of all the producers, they were found to be gica against ...
    My guess would still be the man to do update the bios, to borrow from somewhere a AM2 + and see how / if it works .. or if it's still decided to buy AM2 +, and if it does not work, then opt for another card the ...

  128. webdan: Excuse me, for different reasons (hectic day full of nerves) I am writing without the "For it is recommended that the computer is supplied with a plug interrupted." Source must be uninterrupted, so do not misunderstand, source must be uninterruptible.

    I admit that I played with focul..dar where UPS source ..
    Either update your propriuzis lasts a few seconds, you little chance to take power even then ..

  129. Neagh:
    No problem, I do not and never have I worked with such procesoare.Nu want to tell the PC at home so as not to cause a general hahaiala ..
    As a complement, all it says that AM2 / 2 + is not compatible with AM3 (number of different pins) as AM2 and AM2 + are compatible and that manufacturers have already included in biosuri MB (or updates) for changes. AM2 +, but unlucky for Jak, those from MSI said that their boards are not compatible AM2 / AM2 +.
    So of all the producers, they were found to be gica against ...
    My guess would still be the man to do update the bios, to borrow from somewhere a AM2 + and see how / if it works .. or if it's still decided to buy AM2 +, and if it does not work, then opt for another card the ...

    So in the end I was right! 😛 I also said that's why it doesn't work because I knew that MSIs are more stinky, they always shoot down instead of aiming up, Laptops are great, they have good products but on the desktop they are damn stingy, just that I failed to mention the reason, it's my fault… I thought this was known.

  130. Adrian: So in the end I was right! I still do it because I said I did not go because I knew that MSI sites are lazy, always pull down instead to aim up at Dell are brilliant, they are good products but damn greedy desktop, only I failed to mention the reason, it's my mistake ... I thought that it knows this.

    I can't wait to have the last word, but ... you said that there is a physical difference between the AM2 and AM2 + sockets, of no number of pins, while here it clearly says that there is no physical difference between the two, only the AM3 socket is different (in other words an AM3, does not "fit" in an AM2 / AM2 + socket)
    The problem with MSI is that they didn't prepare the boards for AM2 +, I think it's debatable, maybe the article on wikipedia is older and in the meantime the ones from MSI woke up, maybe on some boards produced by MSI, it works on others no..there are many options, that's why I said it's worth trying man..before putting the money on another board…

    PSDau additional explanations (in parentheses), the idea that all users understand what I read here, and the less initiated, to which not only the direct answer.

  131. Jak:
    Thanks helped me out

    I hope you succeed, if you do not read once it's more what I wrote and I sirestul, read to understand

  132. Neagh: I admit that I was playing with fire .. but where power ups ..
    Either update your propriuzis lasts a few seconds, you little chance to take power even then ..

    Neither am I ever broke a board with BIOS updates, and I do not usually when I updade doresc.De BIOS, board indiferend I buy a UPS to make sure that I will have no surprises

  133. Corleone said

    Neagh: I admit that I was playing with fire .. but where power ups .. Either update your propriuzis lasts a few seconds, you little chance to take power even then ..

    Well look how I am fleshuit a bios from windows but I was not interrupted current loat nustiu why did not complete all done it as a good .Partea was that physical BIOS was not glued on board, was in socket here city ​​to me is a good boy working on a computing station went to his mother and rewritten (to put it out of the socket on a motherboard which have different slots for different types and rewrote miles) .While the plate gone but not this cauza.Cu something odd play, you have to leptop battery escape you, but what do you do if you do not write well ????

  134. I made the mistake of sending me via email when a new comment and do not know how to get him out. I can ajuata someone?

  135. bobu: I made the mistake of sending me via email when a new comment and do not know how to get him out. I can ajuata someone?

    Where you checked, you have the option "Manage your Account" from there you manage your own subscription, if you want to receive comments, if not no, we do not hold anyone by force, I'm kidding of course…
    You have options there.
    Give me an answer to see if you did or not.

  136. That I came ready to remove. Thank you!

  137. Corleone: Well here I am as a fleshuit bios in windows but I was not interrupted current loat nustiu why not complete, though a done it. Good part was that it was not physical BIOS bonded plate was in the socket and here in town to me is a good guy working at a computer station went to his mother and rewritten (to put it out of its socket on a motherboard which have different slots for different types and mercy rewritten). Whilst the plate it went but not so odd cauza.Cu play at leptop battery do you escape you, but what do you do if you do not write well?? And genes have to know what makes you do this? Did you change something that does not work to capacity?'ve Read that offers new bios? Generally the first choice writing bios that are claimed not to be problems and come up with revisions after,,,,, and they inform you that you resort to extra time so

    Corleone
    With so odd play at leptop battery do you escape you, but what do you do if you do not write well??

    Well if you do not write complete CMOS will only run routines and subroutines written complet.Adica, the motherboard can run but you do not recognize RAM and restarts them (not "go" on), if you she does not recognize RAM you recognize the controller for EIDE or SATA and restarts etc.Eu Patania I saw this in others, so the live.

  138. webdan:
    Well if you do not write complete CMOS will only run routines and subroutines written complet.Adica, the motherboard can run but you do not recognize RAM and restarts them (not "go" on), if you she does not recognize RAM you recognize the controller for EIDE or SATA and restarts etc.Eu Patania I saw this in others, so the live.

    I saw that the BIOS is made up of several parts seem to be 3 ..
    The program asks you what parts you want to write, perhaps under certain conditions goes an old part with 2 new parts ... but it seems silly to write down only half especially when you do not know which role does each side ...
    In this case you do not know let you do this thing .. but anyway my opinion is that you do not write your check everything you wrote only half the new part was not 'understand' the old one, and deaia happened so ...

  139. Neagh: I saw that the BIOS is made up of several parts parcasunt 3 ..
    The program asks you what parts you want to write, perhaps under certain conditions goes an old part with 2 new parts ... but it seems silly to write down only half especially when you do not know which role does each side ...
    In this case you do not know let you do this thing .. but anyway my opinion is that you do not write your check everything you wrote only half the new part was not 'understand' the old one, and deaia happened so ...

    Okay, you wanted to write something, but you don't leave the new part of the old part of the third part of the second. You were nice…

  140. You know oleaca hackerye :)) :)) :)), where so much ???
    Wed mia liked this video tutorial, and do not laugh as this videotutorial Corlenone comment, you'll see a video tutorial you factor how you presented, bv Corleone, that chear mia liked, but I tried to do this on a linux went bv, congratulations: D

  141. webdanGood Neagh, you wanted to write something, but not the new from the old iesti the third part of the doua.Ai was nice ...

    Well not, and you now .. had a drawing, sketch something .. ::)))

  142. where remote control software download 3

  143. Corleone said

    adi: Where remote control software download 3

    It is obvious that you lacked patience .ASA will not get hak had patience niciodata.Daca not have asked this, on the contrary you would have seen that is not the purpose of the tutorial that you just rushed vezi.M you try sal once!

  144. do you know that xardas is actually a fraudster ??? the program is not your own creation and is only modified… the keylogger has only been purchased a license and could be modified to his liking…
    This child is not a big hacker, in my opinion
    I still handy link to confirm my words but I will return ...

  145. Alex: Xardas actually know is a fraud??? program is not just our own creation and was only changed ... Keylogger purchase a license and could be modified sole discretion ...
    not hacker kid ... my opinion ;)
    I still handy link to confirm my words but I will return ...

    Naturally, it is everywhere, they steal source code or change applications on sourceforge.net anonymous.
    We were also thinking of giving some examples of the famous producers of accounting software in Romania but we do not want to make enemies, this war would not serve anyone, I say war because the "man" when he sees his position threatened and especially the consistent gains from contracts with the state, he is also capable of murder.
    This is Romania, live in a furaciune continue, few sites in Romania that creates unique and consistent content can be counted on fingers through them and us, it is hard for us to compete with sites like Xerox drawn, they take content out and then translate it and give her pasta on their website.
    Let's not hard to make money in Romania, the harder it is to the spine.

  146. I looked at clip on remote control 3, but I realized something as he changed the password the moment I saw that on display at UNDOWS EXZISTA useful file password ALA CHANGE ONE WHERE you take to change SI YO PLEASE AJUTAMA

  147. ADI: I have watched clip on remote control 3, but I realized something as he changed the password the moment I saw that on display at UNDOWS EXZISTA useful file password ALA CHANGE ONE WHERE you take to change YO AND PLEASE AJUTAMA

    We can not help you because that's not the purpose of this tutorial, but how will we avoid, not how to use it and how to change the password, although it was shown how to do this, it's better that you do not understand, stay away from these software that will get worse, please do not play with fire you'd be sorry! Your job, you have been warned!

  148. regallcobra said

    much to change email password control.la.distanta.3.dar not leave because they do not encourage the use of this software

  149. yes interesting to know! but it's still a hypothesis! I have the basic computer with everything I need and everything I have put together and I want to enter with this program, which, as you say, will make me spy too! so… I go to the store, I make a calculation of 600 lei I put the windows and the program on it and dc the one who did the program spies on me it hurts in basketball because it has nothing to see :))

    ps was an assumption, since we do so

  150. Very nice and very useful tuturial cards

  151. Bai nene I will love this site but not the Omu who made this tutorial.

  152. hello also helped a lot I had to do something I've been the victim of such a program

  153. hello I want to thank you for everything you are doing here you guys valid congratulations I want to please myself is to realize a tutorial in which to present how we can hide a file {server} in a picture that opening picture running hope I understand that I thank faut

  154. When you write a virus have the option to give an icon so a look! Do you want an association with jpg. can bli8nda something but you should know exactly what you want.

    • Hello! Please help me !!! I also suffered such a case, namely: a friend brought me a pc to install the operating system plus other programs… I connected that pc to a rowter with several inputs of which one of the inputs was connected a pc that it worked in a computer network. the pc brought by my friend was full of trojans, backdoors, spy… etc so I decided to format his system I couldn't do anything to even format it, eventually I managed to I formatted with the help of a windows 7 mounted on a bootable usb stick only the partition where it is so that there was some data on the other, I want you to tell me what happened because someone after a few hours from these events took control of the other pc which was it on the rowter in the network ??? and please tell me a solution a software that no longer allows this hack. thank you in advance!

  155. Gabi246: Bai nene I will love this site but not the Omu who made this tutorial.

    I need your love right not drive MICHAIEL SEARCH GEORGE!

  156. A tutorial can bow: D and if it can show us all how to make server undetectable bow pls thanks in advance :)

  157. Pugsley: A tutorial can bow: D and if it can show us all how to make server undetectable bow pls thanks in advance :)

    Unfortunately there will be a tutorial here videotutorial.ro also hack and do not promote piracy! Colreone tutorial showed something different and you've misunderstood, showed how we avoid so as not to create those servers! If you want to be jaxorel you only learn where you want, but here you will learn hack ever!

  158. Huh, everyone wants to be in the hax33r0li l3t a hacker never uses software designed by someone else.

    Take and read
    "Http://catb.org/~esr/writings/unix-koans/script-kiddie.html"

  159. tutorial weak. I do not want to offend anyone, but to sit 30 min to watch, too much! could explain 10 min max! and explanations very mixed!

    another thing, ptr author: fuckoff.exe just that little program installed. other, svchost.exe is a system process. Search on Google. this svchost.exe'll find it there since the installation of Windows.

  160. Jogu:
    tutorial weak. I do not want to offend anyone, but to sit 30 min to watch, too much! could explain 10 min max! and explanations very mixed!
    another thing, ptr author: fuckoff.exe just that little program installed. other, svchost.exe is a system process. Search on Google. this svchost.exe'll find it there since the installation of Windows.

    The thing is that all programs of this type (Prorat, Optix, SubSeven ..) hide their true identity under common names such as svchost.exe .. Moreover, some do not even appear in the task manager. From here you can easily draw the conclusion that that program is more for didactic use than to be really useful. Anyone who has looked at it through taskmanager would see that fuckoff..and you don't have to be an expert to realize that such a thing, and with so name, has nothing to do there…

  161. iulianzalaru said

    I greet everyone present here… you say that it is not ok to use this program but look I would need it to use it… and tell you why… I repair the pc and for maintenance I still have it so for any minor defect I have to run home to x people and let them do something that he doesn't really know about and says it's my fault ,,, so and I have to go man because he didn't give money man no. But if I had this program I would be super satisfied that I can solve the problem at home, please know the owner of that PC. So I would be very useful this program and if you understand the intention for what I need it I will be very grateful to you and me. I have it but it doesn't work, its server is infected and the antivirus doesn't let me unzip it on the PC. that he has that I saw that he could unzip it in dc ias be grateful.I have 33 to I'm not a kid of this to enter the PC in the world, I'm not even interested in sitting on the PC to talk to a person like me who hates computers when I have free time I don't even want to see computers, if you believe me I don't even have a PC in my room. My name is iulianzalaru, I also put an id of yours, Mr. Corleone. I don't want to say it here so that other misfortunes don't happen because of me ... and if you want me to work with this vessel, be grateful..thank you and I respect the work you do to teach us to avoid the crazy people who sit on the net and look at someone else's pc for no reason and who do not help them with anything in life. THANK YOU AND I WAIT AN ANSWER ,,,,,,,, RESPECT

    • iulianzalaru:
      I greet you all present here ... you say it's not bn to use this program but here I would need it to use it ... and to tell you why ... I fix PC maintenance and all io santdeci any minor defect must to run home to x persoanas and SalI do something he actually knows and says it's my fault, so I gotta Sweet and man that never gave money Omu work.But if I had the program that would be super happy as can settle marog home owner that knowingly pc.Deci MIAR be very useful to me and if this program Mati intention understood what I needed it I would be very grateful to you I mil give and mie.Eu but I do not go servaru's e virus and antivirus does not let me unzip the pc.Intrun word that I would like if Mr. Corleone is a very good computer after the tutorial which is really based lam seen and known, was the guy you give mil I saw that he has been able to extract the dc ias be grateful. 33 years I have not a kid in this ditch to get into PC world I do not care to sit him on the x pc to unblu person like me is my computer sick when I have free time I do not want to see computers, if you believe in my room I did not PC.'s iulianzalaru I put my id and an id of yours Mr. Corleone do not want to say it here so as not to other misfortunes happen because of me .. and if you want to work with this prg I should be grateful .. thank you and respect the work that you do to teach us to beware of crazy behind the net and looked in another pc no sense and does not help with anything viata.VA MULTUMESCA and wait for a reply,,,,,,,, respectively

      Hello.
      Well, if you want programs with which to enter the client's home on the PC, you need a "team viewer". To use team viewer you need a phone to be at the client to give you the user and password (maybe on the mess) , but you definitely need internet. Anything to check a monitor is a little trickier because there are hundreds of reasons why a monitor does not work. So you can check a monitor to see how a computer behaves in windows using the program named above. tutorial with team viewer here

  162. I don't understand anything it sounds very slow how you wrote so many comments…

  163. I think it's a prog that for some even would help them supervise their family ie especially those who are away and can not take legetura with them and generally Keylogger knows who I'm talking about me all the time leaving his wife and girls in trips and any time it does not take a laptop or a suspect not be traced or does not know what to cred.in delegation arrive any country where they are offers rooms with internet access and call.as like to ask if I can help I get my program to not spy anything but familia.pe Besides being a good person with whom you can discuss'd like to make you understand the agreement that I really need this prog's ( repeat) only for family mea.nu are a child that I want to do Hakari are serious and I would not accept anything for this prog I 40 years and I do not have copilarii.va and I thank my raspuns.id neluspan.o good day respectfully

  164. baffles me one thing if you have dynamic IP you may be attacked by that program and restart you simply change your IP and even the chain that old ip RDS.Deci you enter before it will no longer available inutil.Chiar so if someone walks into your calc imediar you restart the danger disappears. Could you clarify this issue

    • Alex: Baffles me if you have a dynamic IP so you may be attacked by that program and restart you simply change your IP and even the chain that old ip RDS.Deci you will no longer come before inutil.Chiar available so if someone walks into your calc imediar you restart the danger disappears. Could you clarify this issue  

      You give you another ip restart, but if the server stays in your PC ala who will put you to receive your new ip new report. You will need to escape and the server is not enough just to restart the connection you

  165. increasingly scary .. look at this tutorial and scare you when you see what I can do without knowing :))
    (let's say I was the victim of someone who uses that program) Let's say, if I don't get that server that provides my ip to the "spy", he can find out in some other way (without anyone telling him) the ip my?

  166. Hello to all! After watching this tutorial I decided to check myself and I by System 32 I was shocked to see that I am there svchost.exe. What could I do? To follow the advice of your PC's start in safe mode and only then try to delete it?
    Thank you in advance!

    • Niki:
      Hello to all! After watching this tutorial I decided to check myself and I by System 32 I was shocked to see that I am there svchost.exe. What could I do? To follow the advice of your PC's start in safe mode and only then try to delete it?
      Thank you in advance!

      You didn't really understand… that "svchost.exe" is a file, a legitimate windows process. That's why viruses / trojans take this name, to confuse you, you know that this is a system file, and not you will delete it..The thing is that it might be a "make-up" virus, but you have no way of knowing, this svchost.exe is like an explorer .exe a native windows file.

    • NikiHi to all! After watching this tutorial I decided to check myself and I by System 32 I was shocked to see that I am there svchost.exe. What could I do? To follow the advice of your PC's start in safe mode and only then try to delete it?
      Thank you in advance!  

      Day in the folder you found that svchost.exe? Be allowed only in certain folders.

  167. Thanks so much for respuns! In fact, there are high knowledgeable in the field, therefore we and quickly pulled some conclusions. I have read on other sites and we understand that it is a file (a legitimate process of Windows). Investigated File is found in the Windows System32. PC works normally, it's slow and does not restarts itself.
    I have deleted anything deaorece read a lot before something interprinde

    Happy New Year to All! PCs to be clean and to bring only joy in the coming year!

  168. poor people said

    So maia les tutorialu was ok with the stick phase to change password
    but the world does not know nor understand struggling!
    The simplest thing is to set an Zone alarm, set it to calumea and block everything and before you give Acceptance to all the sucker on the mess who says "" look how loud it is "and you let me see the botu botu
    That happens to all who want to learn until you learn not burn
    In all that we trebe a pita from what or service work all day

  169. You may facetzi a video tutorial a program that will not be attacked by altzii and can fix these functions.
    I guess what I mean intzeles Matz.
    Waiting for some answers to my opinion

  170. not working.

  171. drshomeboy said

    Is there a program that makes your computer explode: D? not the other, just curious

    • Is there a program that makes your computer explode? not the other, just curious ...  

      NOT lol!

    • francisc said

      Is there a program that makes your computer explode? not the other, just curious ...  Cite me

      Yes it's called "user" ”and there's another" Renel "or" Enel "something like that.

  172. symyforever said

    I have to contradict someone here…
    1. Hellsoft is the most criminal site… I say this because the whole site is full of servers and stealers… even the programs you give money to ..
    2. A virus can only be blinded in an .exe file but you can easily change its icon with resource hacker to a jpg icon…
    3. The most wanted being keyloggers, you can include them in a crack or pack without being detected… so the crack or pack runs together with the keylogger…
    4. What I recommend, do not take on-site programs whose dinaseta hellsoft ghost that has become the real travesty hack sites.
    5. Scan any program you take on the internet…

  173. Florin said

    CSystem32 application is actually software application that connects to the server, it is possible that the application to do and then transfer and change the password was actually visible server, install the application server, application server installed password was not changed since the change was made to install the server application svchost.exe.
    To uninstall the easiest would be to delete in safemode svchost.exe installed server, deleting the 2 detection and antivirus applications, and also deleting application csystem.exe
    Also the term hacker is inappropriate. The correct term is cracker, a hacker will first make his own utilities depending on what he has to do, and most real hackers work for different corporations to strengthen their security, crackers are those who look for such programs to steal and remove take advantage of this or just have fun. Those who use applications like the one presented in this tutorial are the so-called "script kids" who have no knowledge of programming their only interest being just to have fun using a program like this.

  174. cossmyn said

    Very good tutorial ... Corleone's congratulations and thanks for the warning ... anyway personally avoid these sites and programs suspecte.Insa ... at one point it was necessary to use something like that ... to help with such a soft and used NetSupport .'d like to know if it was a choice buna.Si still something about Avast antivirus ... is somehow 4.8 Home Edition ... Cause I got it and I think it's a little 2010.Asa overcome it? mention that we license from him .

    • francisc said

      Very good tutorial ... Corleone's congratulations and thanks for the warning ... anyway personally avoid these sites and programs suspecte.Insa ... at one point it was necessary to use something like that ... to help with such a soft and used NetSupport .'d like to know if it was a choice buna.Si still something about Avast antivirus ... is somehow 4.8 Home Edition ... Cause I got it and I think it's a little 2010.Asa overcome it? mention that we license from him .  Cite me

      It would be wise to pass on 5 version. The license is valid. In this sense explanations of their official website.
      Do as you think.
      Good luck!

      • cossmyn said

        It would be wise to pass on 5 version. The license is valid. In this sense explanations of their official website.
        Do as you think.
        Good luck!  

        OK thanks a lot!

  175. Hey, give ALAU =))) die of laughter. Radmin is still something, stay calm. If you do not open server.exe, it's all right.

  176. hello everyone… .I watched the whole tour and I don't know if you believe me but I have the messenger list on the owner of that site… I also have an account there for a very long time and I took many programs from them, which really helped me , but now I was shocked when I saw what could happen and I went into task manager and I saw there svchost.exe opened about 4 times, I tried to shut it down and at last it shutdown me on pc… I repeated the thing and all the same consequence, how can I get rid of it? add petry_assassinu_2007 please, because I don't have anything suspicious in the drivers, I still scanned everything system32 and nothing… but I have svchost.exe in system32, please help me… I think that one took everything his muscles wanted from me pc and I have enough to hurt me….

  177. Team welcome videotutoriale.ro
    are the only site that teaches well, I thank you for everything and tinetio so on are the best.

  178. can solve the situation where you are in the tutorial system restore

  179. sal is totally wrong you can ask but do not know how hard he schiimb password tutorial are the best

  180. When I do not change password: (((says password incorrect! Bonding solution? We win 7

  181. I like tutoriaulu, congratulations! dc not do tutorials? That was ultimu? APPLICANT?

  182. looks like it's very good tutorialu! in many reviews, bravo! Corleone give me good again! I like his tutorials.

  183. sledgehammer said

    I like it more explicitly tells Corleone from other, tineo so on

  184. Honestly very good tutorial and after watching it I lost the urge to hack 😀 but I have a question too! What is svcost.exe actually ???? k I found it in all computers with the version of windows xp imd after installation (I specify k windowsu is taken from torrents and is not original) but I want to know if that svchost.exe is a virus and if I am a victim 100% because k I have that file that was installed with win k are there more people who pay installments, buy sell ETC… online?

  185. Boy knows something from the tutorial :), when I saw that he has Avast I thought he was a boy who wants to see what it's like to be a hacker… but when I saw that he also has Zone Alarm it means that he is a very good hacker 🙂 Beautiful video

  186. That which made tutorialu's criminal!

  187. laurentiu said

    For those who want to experiment with such applications using vbox install a virtual windows in an HP environment is so dark and no one can connect to the keylogger him and about any longer antivirus detects it

  188. ISO-tech said

    A small question though if I take the program from elsewhere having it all included (the server I have to give to someone else, installation, passwords… etc) will the same thing happen?

  189. iustin said

    Okay .... I have a question! I installed Remote control everything I did. But where have the web server by sal guy who give you the victim? They UCM mil do? How do I get it?

  190. AdrianGudus said

    iustin:
    Okay .... I have a question! I installed Remote control everything I did. But where have the web server by sal guy who give you the victim? They UCM mil do? How do I get it?

    You have misunderstood the purpose of this tutorial! The purpose of this tutorial is not to show you how to spy, view the tutorial is to show you that it is possible to be a spy and he has to stay away from it.

  191. Yeah man a really good article, but badly mistaken about hackers, no hackers today we did not see this tutorial for k did not have internet (and I do not mean the signal, I mean the internet toot)
    Who do you say akolo, those are crackers, there is a big difference between hackers and crackers, but people call them hackers, but I have no idea why, probably simply because they are not documented in this field…
    Costruiesc programs and beneficial applications Hackers / crackers destroy
    Hackers create programs / crackers use them to destroy other programs
    So it's a big difference between hackers and crackers

  192. Greetings Corleone. I would like dk can tell me any program Flosi dk can hack the game for superstar racing game I have unlimited boost, ie nitro, something like

  193. good evening about svchost.exe is normal 17 times I started expecting an answer

  194. I do not know how to do what you did at avast
    wait for response

  195. But team wiver what is good?

  196. Andrey said

    Hi, Cristi…. I want to know if there is a hack for the android game called "pou"

  197. Stop "Heckereala" and listen to this man, because absolutely all hacks are detected as viruses, and not in the sense of virus itself, but in the sense of server, in short "guinea pigs" just like the dome also explained to you with the video. "Trick" hackers don't go online with "mocha" programs "trick" hackers go with programs made by them or with programs made by those behind them, you will never see a real hacker walking with programs on the net who anyone can download them at any time and use them as well. All that means "hack" on the net, are programs with a certain server in them and eventually you will end up regretting. You should also know that the anti virus should be known not only by the fact that it detected a virus, but by the fact that that detected virus (more or less dangerous) can even be a very dangerous server, and as I said, you should know very good and what anti virus you work with because they are all detected the same and some anti viruses will show that it deleted if you applied the deletion, but that file still works in your pc. this man's video tutorials, because you have something to learn, and maybe "hacking" will come out of your head 🙂 A good day / evening.

  198. What does it call your antivirus is good as we have seen.

  199. Antivirus uses the boy in the video is avast. But the tutorial is atungi 2009 and so have Avast icon

  200. ailahsilmey said

    Without too many details and without copying too much. Crackers and Hackers aka white hats and black hats / …… / is a completely different food and both are both SUPER EXPERTS not the kind of people who use ceat engine to activate speed in game :) ). Some break programs with the help of those created by hackers who create and go through security in order to improve it… crackers use for their good consumption :) <<< I hope I expressed myself as in kindergarten :) success to all no matter what I think you got here.
    PS "dk a low life is given on TV as a hacker

  201. nice video you freight

  202. bv're good

  203. However, my mind takes me a step further and I came the next question.
    If I install a virtual machine and install the program there can not use the program without risking to be anyone's guinea pig?
    As far as I know you can do whatever you want with virtual machine that nothing happens to the host virtual machine.
    Or I am wrong.

Speak Your Mind

*